Patents by Inventor Nathan Howe
Nathan Howe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12284158Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for compute resources from User Equipment (UE); validating a user of the UE for the compute resources; responsive to the user being authorized, creating a connection between the UE and a destination of the compute resources; responsive to the user being unauthorized, rendering the compute resources as hidden from the UE. The steps can include utilizing a cloud-based system for control and signaling the connection.Type: GrantFiled: October 1, 2021Date of Patent: April 22, 2025Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart
-
Patent number: 12177667Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: GrantFiled: March 21, 2022Date of Patent: December 24, 2024Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
-
Patent number: 12167273Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: GrantFiled: March 21, 2022Date of Patent: December 10, 2024Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
-
Patent number: 12137082Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE) via a Radio Access Network (RAN); determining a path to the workload; creating a tunnel to the workload; and steering the request to the workload via the tunnel that is independent of any underlying mobile network for the RAN. The tunnel can be encrypted and used on a per-application and per-session basis.Type: GrantFiled: October 1, 2021Date of Patent: November 5, 2024Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20240283826Abstract: Systems and methods are provided for controlling network access in a zero trust environment. A method, according to one implementation, includes the step of monitoring and controlling access between a user device and a network application using a zero trust policy engine having a Zero Trust Architecture (ZTA) in which no user, user device, or network application is inherently trusted. The method further includes the step of granting trust by allowing the user device to access the network application when identity and context information associated with a user of the user device is verified and when policy checks of the zero trust policy engine are enforced.Type: ApplicationFiled: June 23, 2023Publication date: August 22, 2024Inventors: Sanjit Ganguli, Nathan Howe, Daniel Ballmer
-
Publication number: 20240267783Abstract: Systems and methods for providing zero-trust connectivity for Subscriber Identity Module (SIM) enabled user equipment include responsive to a device having a SIM card equipped therein connecting to a cellular network, intercepting traffic associated with the device traversing the cellular network; forwarding the traffic through a cloud-based system; and processing the traffic from the device according to policy enforced by the cloud-based system.Type: ApplicationFiled: January 22, 2024Publication date: August 8, 2024Applicant: Zscaler, Inc.Inventor: Nathan Howe
-
Patent number: 12010553Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE); determining a type of traffic for the workflow and querying a machine learning engine based on the traffic type; informing the UE of how the workflow should be accessed; and receiving an updated request for the workflow and steering the traffic based on how the workflow should be steered. The steps can include receiving policy updates from a cloud-based system, related to how workloads should be steered.Type: GrantFiled: October 1, 2021Date of Patent: June 11, 2024Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20240129321Abstract: Systems and methods for a zero trust architecture are provided. A method, according to one implementation, includes detecting an initial attempt by an entity to connect, access, or communicate with a network resource and blocking the entity from initially connecting, accessing, or communicating with the network resource. The method also includes performing a verification procedure to verify one or more of an identity of the entity and a context of the initial attempt. The method also performs a control procedure to control one or more of malicious content and sensitive data. In addition, the method includes performing an enforcement procedure in response to results of the verification procedure and control procedure to determine how to handle the initial attempt.Type: ApplicationFiled: May 8, 2023Publication date: April 18, 2024Inventors: Nathan Howe, Sanjit Ganguli, Gerard Festa
-
Publication number: 20240031455Abstract: The present disclosure relates to systems and methods for in-transit protocol translation. Specifically, various approaches are described for translating protocols for intermediate networks in a way by which there is no need of support for encapsulation/decapsulation at the end hosts and does not require any changes to end hosts or transit networks. Various embodiments include intercepting traffic between one or more source client devices and a transit network; detecting a first communication protocol used by the one or more source client devices in the traffic; translating the traffic from the first communication protocol to a second communication protocol; and forwarding the traffic to the transit network using the second communication protocol.Type: ApplicationFiled: August 8, 2023Publication date: January 25, 2024Inventors: Arvind Nadendla, Kartik Kumar Chatnalli Deshpande Sridhar, Subramanian Srinivasan, Vipin Kumar, Kenneth B. Urquhart, Nathan Howe
-
Patent number: 11765593Abstract: A Multi-Access Edge Compute (MEC) system includes a plurality of compute resources including one or more processors configured to implement services; wherein the services include any of edge services, routing functions, and hosted services; and wherein the services further include cloud-based security services implemented in the MEC in conjunction with a cloud-based security system that includes a plurality of nodes and offers multi-tenant cloud-based security services, and wherein the cloud-based security services implemented in the MEC are for subscribers of a service provider associated with the MEC.Type: GrantFiled: July 9, 2021Date of Patent: September 19, 2023Assignee: Zscaler, Inc.Inventors: Nathan Howe, Kenneth B. Urquhart
-
Patent number: 11596027Abstract: A method, implemented in a cloud-based system, includes, responsive to a client device having a Subscriber Identity Module (SIM) card therein connecting to a mobile network from a mobile network operator, receiving authentication of the client device based on the SIM card; receiving forwarded traffic from the client device; and processing the forwarded traffic according to policy, wherein the policy is determined based on one of a user of the client device and a type of the client device, each being determined based on the SIM card.Type: GrantFiled: March 8, 2021Date of Patent: February 28, 2023Assignee: Zscaler, Inc.Inventor: Nathan Howe
-
Publication number: 20220408255Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: ApplicationFiled: August 17, 2022Publication date: December 22, 2022Inventor: Nathan Howe
-
Publication number: 20220286429Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE) via a Radio Access Network (RAN); determining a path to the workload; creating a tunnel to the workload; and steering the request to the workload via the tunnel that is independent of any underlying mobile network for the RAN. The tunnel can be encrypted and used on a per-application and per-session basis.Type: ApplicationFiled: October 1, 2021Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20220286860Abstract: A Multi-Access Edge Compute (MEC) system includes a plurality of compute resources including one or more processors configured to implement services; wherein the services include any of edge services, routing functions, and hosted services; and wherein the services further include cloud-based security services implemented in the MEC in conjunction with a cloud-based security system that includes a plurality of nodes and offers multi-tenant cloud-based security services, and wherein the cloud-based security services implemented in the MEC are for subscribers of a service provider associated with the MEC.Type: ApplicationFiled: July 9, 2021Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20220286428Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for compute resources from User Equipment (UE); validating a user of the UE for the compute resources; responsive to the user being authorized, creating a connection between the UE and a destination of the compute resources; responsive to the user being unauthorized, rendering the compute resources as hidden from the UE. The steps can include utilizing a cloud-based system for control and signaling the connection.Type: ApplicationFiled: October 1, 2021Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20220286911Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE); determining a type of traffic for the workflow and querying a machine learning engine based on the traffic type; informing the UE of how the workflow should be accessed; and receiving an updated request for the workflow and steering the traffic based on how the workflow should be steered. The steps can include receiving policy updates from a cloud-based system, related to how workloads should be steered.Type: ApplicationFiled: October 1, 2021Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart
-
Publication number: 20220286894Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: ApplicationFiled: March 21, 2022Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
-
Publication number: 20220286912Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: ApplicationFiled: March 21, 2022Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
-
Publication number: 20220287151Abstract: A method, implemented in a cloud-based system, includes, responsive to a client device having a Subscriber Identity Module (SIM) card therein connecting to a mobile network from a mobile network operator, receiving authentication of the client device based on the SIM card; receiving forwarded traffic from the client device; and processing the forwarded traffic according to policy, wherein the policy is determined based on one of a user of the client device and a type of the client device, each being determined based on the SIM card.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Inventor: Nathan Howe
-
Publication number: 20220286854Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.Type: ApplicationFiled: March 21, 2022Publication date: September 8, 2022Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven